0x4141414141 / Malware-DevlopmentLinks
Work in progress experiments with reverse shells, AV bypass and extraction of secrets from memory in C
☆39Updated 5 years ago
Alternatives and similar repositories for Malware-Devlopment
Users that are interested in Malware-Devlopment are comparing it to the libraries listed below
Sorting:
- ☆38Updated 2 years ago
- Scan your computer for known vulnerable and known malicious Windows drivers using loldrivers.io☆86Updated last month
- IAT Unhooking proof-of-concept☆30Updated last year
- Windows Administrator level Implant.☆50Updated 10 months ago
- ShadowForge Command & Control - Harnessing the power of Zoom's API, control a compromised Windows Machine from your Zoom Chats.☆47Updated 2 years ago
- A small red team course☆40Updated 2 years ago
- Source code and examples for PassiveAggression☆64Updated last year
- Version 2 - A modern 64-bit position independent meterpreter and Sliver compatible reverse_TCP Staging Shellcode based on Cracked5piders …☆103Updated 4 months ago
- ☆120Updated last year
- ☆108Updated 9 months ago
- Situational Awareness script to identify how and where to run implants☆57Updated 8 months ago
- ☆36Updated last year
- Docker container for running CobaltStrike 4.10☆37Updated 11 months ago
- ☆84Updated 3 years ago
- POC of GITHUB simple C2 in rust☆52Updated 3 weeks ago
- ☆59Updated last year
- This project is an implant framework designed for long term persistent access to Windows machines.☆110Updated last year
- EvtPsst☆55Updated last year
- ☆42Updated last year
- Scripts I use to deploy Havoc on Linode and setup categorization and SSL☆42Updated last year
- ☆108Updated 2 years ago
- malleable profile generator GUI for Havoc☆55Updated 2 years ago
- ☆58Updated 9 months ago
- a variety of tools,scripts and techniques developed and shared with different programming languages by 0xsp Lab☆65Updated 7 months ago
- A tool for interacting with the Anti-Malware Scan Interface API for pen testing purposes.☆65Updated last year
- Make an Linux Kernel rootkit visible again.☆55Updated 5 months ago
- This is the combination of multiple evasion techniques to evade defenses. (Dirty Vanity)☆51Updated last year
- AutoRMM is a collection of scripts and instructions we are organizing, to test delivery mechanisms for RMM and screen sharing tools, alo…☆83Updated 3 weeks ago
- Deploy a phishing infrastructure on the fly.☆74Updated 8 months ago
- Red Team Operation's Defense Evasion Technique.☆55Updated last year